

Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. The standard format for interpolation is "$", where "prefix" is used to locate an instance of .lookup.StringLookup that performs the interpolation.


A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.Īpache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework.

SUSE Manager Server 4.0 cryptctl versions prior to 2.4. This issue affects: SUSE Linux Enterprise Server for SAP 12-SP5 cryptctl versions prior to 2.4. The vulnerability is derived from prototype pollution exploitation.\rExploiting this vulnerability might result in remote code execution ("RCE").\r\r**Vulnerable functions:**\r\r_defineGetter_, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().Īuthentication Bypass by Alternate Name vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.This issue affects Redline Router: before 7.17.\n\nĪuthentication Bypass by Primary Weakness vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.This issue affects Redline Router: before 7.17.\n\nĪ Improper Authentication vulnerability in cryptctl of SUSE Linux Enterprise Server for SAP 12-SP5, SUSE Manager Server 4.0 allows attackers with access to the hashed password to use it without having to crack it. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) server and the ability to remotely control garage doors or smart plugs for any customer.Īll versions of the package safe-eval are vulnerable to Prototype Pollution via the safeEval function, due to improper sanitization of its parameter content.Īll versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The listed versions of Nexx Smart Home devices use hard-coded credentials.
